RiskIT Logo

Issue 55                                             Friday, January 6, 2012 

 

5 IT Security Lessons for the New Year

 

Themes that Will Segue from 2011 to 2012

 

As we close out one year and begin another, let's look at a handful of the 100-plus blogs I had written in 2011 to identify themes in information security over the past 12 months. Here are five of them that should resonate in 2012: Breaches, responsibility, trust, cyberwar and risk.

  

To read this article in its entirety, please click:

5 IT Security Lessons for the New Year

FFEIC Banking Security Guidelines in Effect Soon

 

As banking applications evolve, common attacks on banks are becoming correspondingly more sophisticated.

 

Small businesses, municipalities, and moneyed individuals are often targeted for obvious reasons: they have hundreds of thousands of dollars, if not a few million, in the bank, but their security is often no more effective than that of the average American household.

 

  

To read this article in its entirety, please click:

FFIEC Banking Security Guidelines In Effect Soon

 

 

Three Surefire Ways To Tick Off An Auditor
  

Avoid these common mistakes to improve your chances for a smooth compliance audit

 

Funny thing about auditors: They're not machines. They're people - people who are capable of pet peeves and whose emotions can color the way they approach their work. So wouldn't it make sense for an organization to do everything in its power to keep auditors happy since they hold your organization's compliance success in their hands?

 

 

  

To read this article in its entirety, please click:

 

BYOD: How to Minimize Risk

 

Security for Personal Mobile Devices Used for Business

 

When it comes to mobile devices, accomodating BYOD, or bring your own device, is a fact of life for organizations in all industry sectors worldwide. So, what can information security professionals do to minimize the risks involved in enabling staff members to use personally-owned tablets, smart phones, USB drives and other mobile devices for business purposes?

 

 

To read this article in its entirety, please click:  

BYOD: How to Minimize Risk

    

Outrageous Behavior on Facebook

 

It's Time to Get Angry About Privacy Violations, and Take Action

Don't assume the entire staff at your organization - or, for that matter, all your contractors - apply common sense when  using Facebook. Odds are that at least some of them don't.

 To read this article in its entirety, please click: 

 Outrageous Behavior on Facebook

 

 
RiskIT Logo 
is an email publication provided by

 

Eminere Group Logo 

 

Disaster Recovery Journal

 

 

 

ISACA Logo

 

 

 

 HIMSS Logo

 

 

More Useful Links...
  
  
  
  
  
  
  
  
  
Join Our Mailing List